DISCARDED: Tales From the Threat Research Trenches cover image

The Art of Threat Detection Engineering

DISCARDED: Tales From the Threat Research Trenches

00:00

Miter Attack Framework - What Are the Most Commonly Used TTPs?

Lake: We were able to kind of look overtime at what are some of the most commonly used t t ps. And i thought it was really interesting, because we looked at a sample that when all of the ukrane wipers were being published ond. Lake: It's working those generic signatures that fire on a specific technique. But it's harder if you want to take the signature for benduke melbore or lis mitrotax.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app